Android Tablet Security Analysis for the 2014 Holidays

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Next Android Tablet Security Analysis for the 2014 Holidays-9 Next


The Ematic brand has popped up in the past, so Bluebox got an Ematic 7” tablet running Android 4.2.2 for $49.99. This device includes three known Android security vulnerabilities.

Trustworthiness: Semi-Trustable

Vulnerabilities: Fake ID, Futex , Master Key


Without a doubt, tablets will be a hot item this holiday season. Retailers from Best Buy, Wal-mart, Target, Kohl's and Staples are hard at work offering can't-miss deals this holiday for a host of "bargain" Android tablets. But how much of a deal are you really getting?

Bluebox Labs recently purchased over a dozen tablets featured in this year's Black Friday extravaganzas (most under $100) and reviewed each of them for security. What they found was shocking and quite terrifying. Many of the devices shipped with vulnerabilities and security misconfigurations – a few even had security backdoors.

We know that the product quality and features on inexpensive tablets are less than more expensive tablets. But Android is Android, and the software running on these tablets should offer the same secure Android experience as other Android devices. Alas, the device vendor makes many decisions when constructing an Android tablet, and some of those decisions can drastically affect the overall security and long-term trustability of the device.

The amount of security variation in Android devices is so large that Bluebox Labs recently released the free Trustable by Bluebox Android application to discover and measure all of the security aspects of a device. The Trustable by Bluebox app produces an overall Trust Score, which provides an indication on how trustable the device is compared to other available Android devices. You can read all about how they compute a Trust Score here and give the Trustable by Bluebox app a try by downloading it from Google Play.


Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

mobile92-290x195.jpg Why and How to Build an Enterprise App Store

Enterprise app stores provide a single "shopping experience" for employees and support both a BYOD model and a self-service IT model. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.